IL323568A - System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems - Google Patents

System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems

Info

Publication number
IL323568A
IL323568A IL323568A IL32356825A IL323568A IL 323568 A IL323568 A IL 323568A IL 323568 A IL323568 A IL 323568A IL 32356825 A IL32356825 A IL 32356825A IL 323568 A IL323568 A IL 323568A
Authority
IL
Israel
Prior art keywords
kds
key
psk
identifier
application
Prior art date
Application number
IL323568A
Other languages
English (en)
Hebrew (he)
Original Assignee
Symmera Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US18/130,942 external-priority patent/US11968302B1/en
Priority claimed from US18/377,866 external-priority patent/US12015721B1/en
Priority claimed from US18/435,253 external-priority patent/US12132846B2/en
Priority claimed from US18/438,586 external-priority patent/US12476793B2/en
Application filed by Symmera Inc filed Critical Symmera Inc
Publication of IL323568A publication Critical patent/IL323568A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
IL323568A 2023-03-24 2025-09-25 System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems IL323568A (en)

Applications Claiming Priority (14)

Application Number Priority Date Filing Date Title
US202363454612P 2023-03-24 2023-03-24
US18/130,942 US11968302B1 (en) 2023-03-24 2023-04-05 Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator
US18/139,508 US12301563B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based wireless access point authentication
US18/139,498 US12261838B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based content signing for tamper resistance
US18/139,480 US12470372B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based secure communications with mobile service provider authenticator
US18/139,486 US12368580B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based selective encryption of partial sections of messages
US18/139,494 US12309262B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based document security
US18/139,500 US12463802B2 (en) 2023-03-24 2023-04-26 System and method for pre-shared key (PSK) based supply chain tamper resistance
US18/206,399 US11882117B1 (en) 2023-03-24 2023-06-06 System and method for device label scan based zero touch device onboarding and device directory service
US18/206,426 US11936772B1 (en) 2023-03-24 2023-06-06 System and method for supply chain tamper resistant content verification, inspection, and approval
US18/377,866 US12015721B1 (en) 2023-03-24 2023-10-09 System and method for dynamic retrieval of certificates with remote lifecycle management
US18/435,253 US12132846B2 (en) 2023-03-24 2024-02-07 System and method for extended attributes in certificates for dynamic authorization
US18/438,586 US12476793B2 (en) 2023-03-24 2024-02-12 System and method to securely distribute authenticated and trusted data streams to AI systems
PCT/US2024/021119 WO2025159775A2 (en) 2023-03-24 2024-03-22 System and method to securely distribute authenticated and trusted data streams to ai systems

Publications (1)

Publication Number Publication Date
IL323568A true IL323568A (en) 2025-11-01

Family

ID=96545976

Family Applications (1)

Application Number Title Priority Date Filing Date
IL323568A IL323568A (en) 2023-03-24 2025-09-25 System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems

Country Status (3)

Country Link
EP (1) EP4690664A2 (de)
IL (1) IL323568A (de)
WO (1) WO2025159775A2 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12554948B2 (en) * 2020-02-11 2026-02-17 Avid Identification Systems, Inc. Method for validating radio frequency identification number

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
JP3992579B2 (ja) * 2002-10-01 2007-10-17 富士通株式会社 鍵交換代理ネットワークシステム
US20130227286A1 (en) * 2006-04-25 2013-08-29 Andre Jacques Brisson Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
US8332923B2 (en) * 2007-01-19 2012-12-11 Toshiba America Research, Inc. Kerberized handover keying
US8983066B2 (en) * 2009-02-27 2015-03-17 Cisco Technology, Inc. Private pairwise key management for groups
EP3496334B2 (de) * 2012-04-27 2023-11-08 InterDigital Patent Holdings, Inc. Verfahren und system zur unterstützung von näherungserkennungsverfahren
US10079682B2 (en) * 2015-12-22 2018-09-18 Gemalto Sa Method for managing a trusted identity
GB201611948D0 (en) * 2016-07-08 2016-08-24 Kalypton Int Ltd Distributed transcation processing and authentication system
EP3291504B1 (de) * 2016-08-30 2020-03-11 Wacom Co., Ltd. Authentifizierung und sichere übertragung von daten zwischen unterschriften- und host-computern mit transport-schicht-sicherheit
US10530860B2 (en) * 2017-06-30 2020-01-07 Microsoft Technology Licensing, Llc Single multi-instance tenant computing system
US10943005B2 (en) * 2017-11-22 2021-03-09 Aeris Communications, Inc. Secure authentication of devices for internet of things
US11269786B2 (en) * 2018-07-25 2022-03-08 Intel Corporation Memory data protection based on authenticated encryption
US11399283B2 (en) * 2018-11-21 2022-07-26 Cisco Technology, Inc. Tenant service set identifiers (SSIDs)
US12476793B2 (en) * 2023-03-24 2025-11-18 Symmera Inc. System and method to securely distribute authenticated and trusted data streams to AI systems
US11968302B1 (en) * 2023-03-24 2024-04-23 Srinivas Kumar Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator
US12132846B2 (en) * 2023-03-24 2024-10-29 Symmera Inc. System and method for extended attributes in certificates for dynamic authorization
US12015721B1 (en) * 2023-03-24 2024-06-18 Srinivas Kumar System and method for dynamic retrieval of certificates with remote lifecycle management

Also Published As

Publication number Publication date
EP4690664A2 (de) 2026-02-11
WO2025159775A3 (en) 2025-10-16
WO2025159775A2 (en) 2025-07-31

Similar Documents

Publication Publication Date Title
US11936772B1 (en) System and method for supply chain tamper resistant content verification, inspection, and approval
US12132846B2 (en) System and method for extended attributes in certificates for dynamic authorization
US12476793B2 (en) System and method to securely distribute authenticated and trusted data streams to AI systems
US12015721B1 (en) System and method for dynamic retrieval of certificates with remote lifecycle management
JP7267294B2 (ja) トランザクションコネクタ及びブローカサービスを使用してブロックチェーンネットワークのバージョン化されたブロックとしてデバイスライフサイクルトランザクションを記録するためのシステム及び方法
JP7267293B2 (ja) 接続されたエンドポイントデバイスのエンロールメント及び登録のためのデバイス識別のシステム及び方法、ならびにブロックチェーンサービス
US11606198B2 (en) Centrally managed PKI provisioning and rotation
Oktian et al. BorderChain: Blockchain-based access control framework for the Internet of Things endpoint
CN108604985A (zh) 数据传送方法、控制数据使用的方法以及密码设备
US12019778B1 (en) Systems and methods to perform end to end encryption
CN110771087B (zh) 私钥更新
IL323568A (en) System and method for securely distributing authenticated and trusted data streams to artificial intelligence systems
US20240297792A1 (en) System and method for secure approval of operations requested by a device management system
US20250337717A1 (en) Secure request transport across transport layer connections
WO2025111130A1 (en) Systems and methods to perform end to end encryption
Dočár Bezpečnostní řešení pro cloudové technologie